Unit 4 (E Com)
Unit 4 (E Com)
What is Encryption?
Encryption helps us to secure data that we send, receive, and store. It can consist text
messages saved on our cell-phone, logs stored on our fitness watch, and details of
banking sent by your online account.
It is the procedure of taking ordinary text, such as a text or email, and climbing it into an
unreadable type of format known as "cipher text." It helps to protect the digital
information either saved on or spread through a network such as the internet on
computer systems.
1. Symmetric Encryption:
What it is: You use the same key to both lock (encrypt) and unlock (decrypt) the
data.
Example: Imagine you and a friend have a secret key. You use it to lock a
message, and your friend uses the same key to unlock it.
2. Asymmetric Encryption:
What it is: Uses two keys – a public key (anyone can use it to encrypt data) and a
private key (only the owner of the key can decrypt the data).
Example: Think of it like a locked mailbox. Anyone can put a letter in (using the
public key), but only you can open it (with your private key).
Pros: No need to share the private key, only the public one.
Cons: Slower than symmetric encryption, especially for large amounts of data.
3. Hybrid Encryption:
Example: You send your friend a locked box (asymmetric encryption), and inside
the box is the key for a secret locker (symmetric encryption).
Pros: Combines the best of both methods—secure and fast.
4. Hashing:
What it is: A one-way function that turns data into a fixed-size value (a "hash"). It
can't be reversed, so you can't get back the original data from the hash.
Pros: Great for checking data integrity (if the hash matches, the data hasn't been
tampered with).
Cons: You can't get the original data back once it's hashed.
What it is: Ensures only the sender and receiver can read the message. Even if
someone intercepts the message along the way, they can't decrypt it.
Example: Like sending a locked box that only the receiver has the key for. No one
else can open it.
Cons: If you lose the key, you can’t decrypt your own messages.
In short:
Key: A key is a secret value that is used in an encryption algorithm to lock and
unlock data. It's like a password for data—only someone with the right key can
decrypt and read the original message.
In symmetric encryption, the same key is used for both encryption and
decryption. In asymmetric encryption, a pair of keys (public and private) is
used.
. Data Encryption Standard (DES)
What is DES?
DES stands for Data Encryption Standard. It was one of the first widely used
encryption algorithms and was developed in the 1970s by IBM and the U.S.
National Security Agency (NSA). It became a federal standard for encrypting
sensitive government data in the 1980s.
Key Size: DES uses a 56-bit key for encryption. Despite the 64-bit block size, the
key itself is only 56 bits long, with 8 bits reserved for parity (error-checking).
Triple DES (often written as 3DES) is an encryption algorithm that applies the
Data Encryption Standard (DES) algorithm three times to each data block,
e ectively making it more secure than standard DES.
Asymmetric encryption, also called public-key cryptography, uses two keys for
encryption and decryption:
o Private key: Used to decrypt data (this key is kept secret and only known
by the owner).
In contrast to symmetric encryption, where both parties use the same key, asymmetric
encryption uses a pair of keys that are mathematically related but not identical.
o The sender uses the recipient's public key to encrypt the message.
o Important: Anyone can have the recipient's public key and use it to send
encrypted messages, but only the recipient can decrypt it.
o Only the recipient knows their private key, so only they can read the
message.
Example:
It's called "asymmetric" because the two keys are not identical. The public key is
used for encryption, and the private key is used for decryption. The encryption
process involves a pair of keys, hence "asymmetric."
1. Two Keys: One for encryption (public key) and one for decryption (private key).
3. Private Key: Kept secret, used to decrypt messages. Only the key owner has
access to it.
Digital Signatures -
How It Works:
2. Receiver: Uses the sender’s public key to decrypt the signature and
compare it with their own hash of the document.
3. If the hashes match, the document is authentic and unchanged.
Key Features:
Digital signatures provide a secure and e icient way to verify the legitimacy of digital
communication.
A VPN is a service that creates a secure, encrypted connection over the internet,
allowing you to access the web privately and safely, as if you were connected to a
private network.
How It Works:
o A VPN encrypts your internet tra ic, masking your IP address, and
routes it through a remote server.
o This makes it appear as if you are browsing from a di erent location, not
your actual one.
Benefits:
Common Uses: